[BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (English)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu May 1 02:01:11 PDT 2014


Fixlet Site - 'Patches for Windows (English)'
Current Version: 1975	Published: Wed, 30 Apr 2014 10:50:22  GMT

New Fixlets:
============

***************************************************************
Title: 931125: Update for Root Certificates (Nov 2013) - Windows Vista / Windows 7 / Windows 8 / Windows 8.1
Severity: N/A
Fixlet ID: 93112519
Fixlet Link: http://support.microsoft.com/kb/931125

Fixlet Description: This item updates the list of root certificates on your computer to the list that is accepted by Microsoft as part of the Microsoft Root Certificate Program. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 982726: Description of the Outlook 2010 Junk Email Filter update 982726 - Outlook 2010
Severity: N/A
Fixlet ID: 98272601
Fixlet Link: http://support.microsoft.com/kb/982726

Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2010 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 982726: Description of the Outlook 2010 Junk Email Filter update 982726 - Outlook 2010 (x64)
Severity: N/A
Fixlet ID: 98272603
Fixlet Link: http://support.microsoft.com/kb/982726

Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2010 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 2918077: VAN UI freezes after KB2813956 is applied in Windows 7 - Windows 7 SP1 (x64)
Severity: N/A
Fixlet ID: 291807701
Fixlet Link: http://support.microsoft.com/kb/2918077

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2918077: VAN UI freezes after KB2813956 is applied in Windows 7 - Windows 7 SP1
Severity: N/A
Fixlet ID: 291807703
Fixlet Link: http://support.microsoft.com/kb/2918077

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution - Enable Workaround
Severity: N/A
Fixlet ID: 296398305
Fixlet Link: http://technet.microsoft.com/en-us/security/advisory/2963983

Fixlet Description: Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. 

Important Note: Applications that render VML will no longer do so once vgx.dll has been unregistered.

***************************************************************
Title: 2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution - Disable Workaround
Severity: N/A
Fixlet ID: 296398307
Fixlet Link: http://technet.microsoft.com/en-us/security/advisory/2963983

Fixlet Description: Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. 

Important Note: Applications that render VML will no longer do so once vgx.dll has been unregistered.



More information about the BigFix-Announcements mailing list